How to hACK Facebook account
Facebook has been using for years by the users and its members do have lots of trust on it even though in the recent time we have noticed lots of security concerns with Facebook. Therefore it’s not easy to hack facebook account. The members of Facebook keep on increasing and there are approximately 1.97 billion active users available on Facebook.
We are very keen to Facebook and share our daily activities with our friends on Facebook. We share all the special occasions such as our birthdays, anniversaries, photos, vacations and also our businesses on Facebook. We also share the emotional moments, cherished moments and sometimes our ideology and philosophy on Facebook. We are sharing all these just to get the world aware about what we think. We strongly feel that nobody will be able to hack fb account but it’s not always true.
We believe that whatever we share is available to our friends, relatives and those who follow us on Facebook. But sometimes there are some bad people also who use our information for malicious purposes and can use the information against us. They keep watching us secretly and know every activity about us and they are always looking to hack facebook account of different people surfing on facebook.
Top 4 Methods to Hack Facebook Account or to Hack FB Account
In order to hack somebody’s facebook acoount, there is no need to be a professional hacker. A bit of computer knowledge will enable you to access other’s facebook account. In this article I will show you some working and proved methods that you can use to hack someone’s facebook account. At the end of article I will also tell you how to prevent your facebook account from being hacked.
#1. Using Keylogger to hack Facebook Account:
Software Keylogger: A software keylogger can be downloaded on the victim’s PC. As soon as it is activated it starts recording each stroke of the keyboard that victim makes. The software keylogger has to be downloaded on the victim’s computer without his knowledge. The keylogger would remain undetectable in the background and once it captured all the keystrokes of the victim, it will send the reports of captured data to your email.
Step by Step Guide to Use Keylogger to Hack Facebook Account
Step 1st: In the first step, download a good keylogger. You can also download emissary keylogger. You can also download some other keylogger via Google search.
Step 2nd: Once you download the emissary keylogger, extract the files on desktop. Many a times your anti-virus might delete the keylogger. So, disable the antivirus before downloading the emissary keylogger. There are no harmful viruses in this keylogger so don’t afraid.
Step 3rd: Now, in the third step execute the emissary.exe file and you will instantly see the window as seen in the image below:
Step 4th: Now, in the fourth step enter your Gmail details in the keylogger then click on “Test” to test the connection. You can create a fake gmail id for this purpose. Here you should test that all the information of keystrokes are delivering to your email or not.
Step 5th: In the fourth step, enter the time at which you would like to receive reports through email. You can use 20 minutes as it always preferable. Also change your server file name. Check all the boxes as shown in the image below:
Step 6th: Now click on ‘Build’ button and create your server file (make sure that your server file is in the same directory).
Step 7th: As this keylogger is free, you cannot send the server .exe file from email services. In fact, all of the email services don’t allow sending and receiving .exe files. It is therefore you need to first crypt and bind your file to any other file such as in image, videos, document etc. If you don’t know how to crypt and bind files than follow the below method to bind the file:
How to Bind Keylogger with Image, PDF or any other File:
Step 1st: In the first step, you need to download any file binder. I would recommend you to download shockwaves file binder. The password is futuretricks.
Step 2nd: You would have three files now. First one is the keylogger.exe file, second one is image or pdf file in which you would like to bind keylogger and third one is shockwave file binder.
Step 3rd: Now, you are required to open the shockwave file binder and you will find two browsing options there. In the first browsing option select the image file or pdf file in which you would like to bind the keylogger. In the second browsing option you need to select the keylogger .exe file as shown in the image below:
Step 4th: Now, tick on “Run Second File Hidden” and also click on Bind Button as shown in the image below:
Step 5th: Now choose the name and path of the new file and your file is successfully bound with the keylogger.
Step 6th: Now send this file to the victim and as soon as he open the image, PDF or any other file with which you had bind the keylogger, the keylogger will be installed in the victim’s computer.
Step 7th: Once the binding process is complete, you can also upload this file on free file storage websites such as mediashare, rapidshare, 4share etc. You can either send the victim the direct download link from the free storage websites.
As soon as victim execute the file you send, the keylogger file will installed on his computer and it start searches all the keystrokes including the username and passwords of facebook and send you email containing all the keylogs and screenshots from time to time as the time interval you have set earlier.
#2. Using Phishing to Hack Facebook Account
Phishing method is another method of attack to hack facebook account. Phishing means to send a fake page to the victim and as soon as he/she enters username and password, you will fetch it from the fake page uploaded on your server.
Phishing can be done using the Kali Linux OS or without Kali Linux. In this article, we will be discussing both methods as how to create a phishing page using the Kali Linux and how to make a phishing page online. For the first method, you should know how to install Kali Linux on your PC.
A phishing page to hack facebook account can be done using the social engineering toolkit that is already installed in Kali Linux OS. The phishing link should be sent to the victim from the same local area network as you and the data that the victim enters on the fake page will be stored in a file on your machine.
Steps by Step Guide to Hack Facebook Account Using Phishing with Kali Linux
Step 1st: Open the Kali Linux with root access as ‘setoolkit’ needs you to have root access.
Step 2nd: Now Type setoolkit’ in the command line.
Here you will get a warning that this tool is to be used with proper license and authorization or for only educational purposes and if you use it for malicious purposes than you violate the terms and conditions of the tool.
Step 3rd: You should agree with the terms and conditions by typing Y in the command line.
Step 4th: Here you will see a menu “next”. Enter 1 as your choice.
Step 5th: Enter 3 to select the ‘Credential Harvester Attack Method’ in order to get the victim’s confidential information by creating a fake page that will few form fields including the username and password options.
Step 6TH: Now, you do have the option here that is either to build a fraudulent page by your own or you can also clone the page of facebook site or other trustworthy site.
Step 7th: If you wish to get a Clone page than Enter 2 in the command line. It may take few minutes to create a page.
Step 8th: Now, in order to get the IP address you should open a new terminal window and write ifconfig. You should copy the IP address as mention in the “inet” field.
Step 9th: SET will ask you to put the IP address where the confidential information of the victim to be stored. Paste the IP address as you copied in the earlier step.
Step 10th: As we have chosen to make a clone of a website, we need to enter the URL or domain of the website of which we would like to make a clone.
Step 11th: As the SET requires the Apache server so you should Enter Y when it prompted about starting the Apache process.
Step 12th: Till here, you have completed the setting up of Phishing page and hosted it on server. SET will make us aware about the directory at which the captured data will be stored.
Step 13th: In order to hide the IP address you should use the URL shortening services to change the URL of actual site.
Step 14th: Now Go to the browser and type http://yourIP (for example:http://192.168.0.203)
Step 15th: If the victim fills the information here in this page and clicks on “Log in”, he will be redirected to actual Facebook login page. Most often, users doesn’t take it seriously and consider it as error in Facebook.
Step 16th: In the final step you can go /var/www/html where you will be able to see the harvester file created there.
Note: Above phishing method is described here just for the educational purposes as you will be able to aware what steps that hackers are taking to hack your facebook account and therefore you should protect yourself. Here you should know the difference between the fake page and real page and it can easily be identifiable if you the URL in the browser. You should never enter your username or passwords in any of the URL of which you are not aware of.
Hope this step by step guide gave you a complete idea of how phishing attacks work.